0% found this document useful (0 votes)
790 views5 pages

Ethical Haching Assignment Week-1 Assignment

An ethical hacker is a cybersecurity professional who is hired by an organization to identify and fix vulnerabilities in their computer systems, networks, and applications. They use the same methods as malicious hackers but with the goal of improving security rather than causing harm. The document consists of 10 multiple choice questions about ethical hacking and related cybersecurity topics.

Uploaded by

Akash barapatre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
790 views5 pages

Ethical Haching Assignment Week-1 Assignment

An ethical hacker is a cybersecurity professional who is hired by an organization to identify and fix vulnerabilities in their computer systems, networks, and applications. They use the same methods as malicious hackers but with the goal of improving security rather than causing harm. The document consists of 10 multiple choice questions about ethical hacking and related cybersecurity topics.

Uploaded by

Akash barapatre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

NPTEL » Ethical Hacking

Week 01: Assignment 01


Question 1 ->

a
b
c
d

Answer ->An ethical hacker is a cybersecurity professional who is hired by an


organization to identify and fix vulnerabilities in their computer systems,
networks, and applications. Ethical hackers use the same methods as malicious
hackers, but with the goal of improving the security of the organization they work
for rather than causing harm
The correct option for the question “Which of the following point(s) is/are true for
an ethical hacker?” is
d. None of these points
1 point

Question 2 ->

a
b
c
d

Answer -> d. None of these.

1 point

Question 3->

a
b
c
d
Answer-> b. A communication link is dedicated to a connection and cannot be shared with other
connections.
1 point

Question 4->

a
b
c
d
Answer-> a. It is a connection-less packet switching approach, where no route is established prior to
transfer of packets.
b. In this approach, each packet is transmitted as an independent entity.
c. In this approach each intermediate node can perform dynamic routing.

1 point

Question 5->

a
b
c
d
e

Answer-> c. It uniquely identifies a running application on a specific host in the network.


1 point

Question 6->

a
b
c
d
e

Answer-> e. 80800.

1 point

Question 7->

a
b
c
d

Answer-> a. Map IP addresses to hardware (MAC) addresses.


1 point

Question 8->

a
b
c
d

Answer-> c. TCP provides connectionless, unreliable delivery systems for packets.

Question 9->

Answer-> The HLEN field in the IP header is a 4-bit field that indicates the length of the IP header in
32-bit words. The minimum value for the HLEN field is 5, which corresponds to a header length of
20 bytes. Therefore, if the IP header is 96 bits long, then the value of the HLEN field would be 12
(96/32).

The value of the HLEN field would be 12.

1 point

Question 10->

Answer-> The maximum size of data that can be accommodated in an IP datagram is 65535 bytes

You might also like